¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181221

Ðû²¼Ê±¼ä 2018-12-21
1¡¢SandboxEscaperµÚÈý´ÎÔÚTwitterÉÏÅû¶δÐÞ¸´µÄWindows 0day

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Ñо¿Ö°Ô±SandboxEscaperµÚÈý´ÎÔÚTwitterÉÏÅû¶δÐÞ¸´µÄWindows 0day£¬£¬²¢ÇÒÐû²¼ÁËÏà¹ØPoC¡£¡£¡£¡£¡£Õâ¸öеÄÎó²î±£´æÓÚWindowsµÄMsiAdvertiseProduct¹¦Ð§ÖУ¬£¬Æ¾Ö¤¸ÃÑо¿Ö°Ô±µÄ˵·¨£¬£¬ÓÉÓÚûÓÐ׼ȷÑéÖ¤£¬£¬¹¥»÷Õß¿ÉʹÓøù¦Ð§Ç¿ÆÈ×°ÖÃЧÀÍÒÔSYSTEMȨÏÞ¸´ÖÆí§ÒâÎļþ²¢¶ÁÈ¡ÆäÄÚÈÝ£¬£¬´Ó¶øµ¼ÖÂí§ÒâÎļþ¶ÁÈ¡Îó²î¡£¡£¡£¡£¡£SandboxEscaper»¹ÔÚGithubÉÏÐû²¼Á˸ÃÎó²îµÄPoC£¬£¬µ«¸ÃGithubÕË»§ÏÖÔÚÒѱ»É¾³ý¡£¡£¡£¡£¡£SandboxEscaperÔøÔÚ2018Äê8Ô·ݺÍ10Ô·ݻ®·ÖÔÚTwitterÉÏÅû¶ÁËÁ½¸öWindows 0day¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2018/12/windows-zero-day-exploit.html


2¡¢McAfee³Æ×î½üµÄShamoon¹¥»÷»î¶¯ÒÉÓëÒÁÀÊAPT33ÓйØ

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø



ƾ֤McAfeeʵÑéÊÒ¶Ô×î½üµÄShamoon¹¥»÷»î¶¯µÄÆÊÎö£¬£¬Ñо¿Ö°Ô±ÒÔΪÆä¹¤¾ß¡¢ÊÖÒպͳÌÐò£¨TTP£©Óë2016ÖÁ2017ÄêµÄShamoon v2¼á³ÖÒ»Ö£¬£¬2018ÄêµÄShamoon¹¥»÷»î¶¯¿ÉÄÜÓëÒÁÀʺڿÍ×éÖ¯APT33ÓйØ£¬£¬µ«Ò²ÓпÉÄÜÊÇÆäËü¹¥»÷Õßαװ³ÉAPT33¡£¡£¡£¡£¡£ÔÚÒÑÍùµÄ¼¸ÖÜÀ£¬Shamoon v3ͨ¹ýÇóÖ°Àà´¹ÂÚÍøÕ¾¹¥»÷ʯÓÍ¡¢×ÔÈ»Æø¡¢ÄÜÔ´¡¢µçÐÅÆóÒµºÍÕþ¸®»ú¹¹£¬£¬ÕâЩÓÃÓÚÍøÂçÊܺ¦Õ߯¾Ö¤µÄÆðÔ´´¹ÂÚ¹¥»÷ËÆºõÔçÔÚ2018Äê8ÔÂβ¾ÍÒÑ×îÏÈ¡£¡£¡£¡£¡£ÔÚеÄ.Net°æ±¾µÄÊý¾Ý²Á³ýÆ÷ÖУ¬£¬Ñо¿Ö°Ô±·¢Ã÷Á˰üÀ¨Ò»¶Î¹ÅÀ¼¾­ÎĵÄASCII×Ö·û£¨Surah Masad, Ayat 1£¬£¬´óÒâÎªÕæÖ÷±Ø½«´¦·Ö£©¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/shamoon-attackers-employ-new-tool-kit-to-wipe-infected-systems/


3¡¢15¸öAndroid±ÚÖ½Ó¦Óñ£´æ¹ã¸æÚ²Æ­ÐÐΪ£¬£¬×ÜÏÂÔØÁ¿Áè¼Ý22Íò´Î

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±ÔÚGoogle PlayÖмì²âµ½15¸öÉæ¼°¹ã¸æÚ²Æ­»î¶¯µÄAndroid±ÚÖ½Ó¦Ó㬣¬ÕâЩӦÓõÄ×ÜÌåÏÂÔØÁ¿Áè¼Ý22.22Íò´Î¡£¡£¡£¡£¡£Ò£²âÊý¾ÝÅú×¢Êܵ½Ñ¬È¾×î¶àµÄ¹ú¼Ò/µØÇøÊÇÒâ´óÀû¡¢Öйų́Íå¡¢ÃÀ¹ú¡¢µÂ¹úºÍÓ¡¶ÈÄáÎ÷ÑÇ¡£¡£¡£¡£¡£GoogleÏÖÔÚÒÑ´ÓPlay StoreÖÐɾ³ýÁËÕâЩ¶ñÒâÓ¦Óᣡ£¡£¡£¡£ÕâЩӦÓÃ×Ô¼ºÒ²¾ßÓкܸߵÄÓû§ºÃÆÀ£¬£¬µ«Ñо¿Ö°Ô±¸ß¶ÈÏÓÒÉÕâЩ̸ÂÛÊǼٵÄ£¬£¬Ö»ÊÇΪÁËÎüÒýÓû§ÏÂÔØ¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.trendmicro.com/trendlabs-security-intelligence/android-wallpaper-apps-found-running-ad-fraud-scheme/


4¡¢MiraiбäÖÖMioriͨ¹ýPHP¿ò¼ÜÖеÄRCEÎó²îÈö²¥

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷IoT½©Ê¬ÍøÂçMiraiµÄÒ»¸ö±äÖÖMioriͨ¹ýPHP¿ò¼ÜThinkPHPÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²îÈö²¥¡£¡£¡£¡£¡£¸ÃÎó²îÊÇ12ÔÂ11ÈÕÆØ¹âµÄÒ»¸öÐÂÎó²î£¬£¬Ó°ÏìÁËThinkPHP v5.0.23/5.1.31¼°Ö®Ç°µÄ°æ±¾¡£¡£¡£¡£¡£Ò»µ©Óû§µÄLinuxЧÀÍÆ÷ѬȾÁËMiori£¬£¬Ëü½«»á³ÉΪ½©Ê¬ÍøÂçµÄÒ»²¿·Ö£¬£¬ÓÃÓÚÌᳫDDoS¹¥»÷¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÁíÍâµÄÁ½¸öÒÑÖªµÄMirai±äÖÖIZ1H9ºÍAPEPͬÑùʹÓøÃÎó²î¾ÙÐÐÈö²¥¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.trendmicro.com/trendlabs-security-intelligence/with-mirai-comes-miori-iot-botnet-delivered-via-thinkphp-remote-code-execution-exploit/


5¡¢ÃÀ¹úºÍÓ¢¹úÔâÓöÐÂÒ»ÂÖ¶ñÒâÓʼþ¹¥»÷£¬£¬Ö÷ÒªÕë¶Ô½ðÈÚ¹«Ë¾

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Menlo Labs·¢Ã÷Õë¶ÔÒøÐкͽðÈÚЧÀ͹«Ë¾µÄ¶ñÒâµç×ÓÓʼþ»î¶¯£¬£¬¸Ã»î¶¯×Ô2018Äê8ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬Ö÷ÒªÕë¶ÔÃÀ¹úºÍÓ¢¹ú¡£¡£¡£¡£¡£¸Ã»î¶¯ÖеĶñÒâpayloadÍйÜÔÚGoogleÔÆÐ§ÀÍ£¨storage.googleapis.com£©ÉÏ£¬£¬ÒÔÈÆ¹ýÇå¾²²úÆ·µÄÇå¾²¿ØÖÆ¡£¡£¡£¡£¡£µÚÒ»½×¶ÎµÄdropper°üÀ¨vbsÎļþºÍjarÎļþ£¬£¬ÕâЩvbsÎļþ¾ÙÐÐÁ˸߶ȻìÏý£¬£¬²¢ÇÒ¿ÉÄÜÊÇÓÉÏàͬµÄ¹¤¾ß°ü½¨ÉèµÄ¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.menlosecurity.com/blog/a-jar-full-of-problems-for-financial-services-companies


6¡¢Î¢ÈíÐû²¼½ôÆÈÇå¾²¸üУ¬£¬ÐÞ¸´Ò»¸öÐÂIE 0day

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


΢ÈíÐû²¼½ôÆÈ´øÍâ¸üУ¬£¬ÐÞ¸´IEä¯ÀÀÆ÷ÖеÄÒ»¸ö¸ßΣ0day¡£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2018-8653£©ÊÇÓɹȸèÍþвÆÊÎöС×éµÄÇå¾²Ñо¿Ô±Clement Lecigne·¢Ã÷µÄ£¬£¬ÊÇIE JScript¾ç±¾ÒýÇæÖеÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¬£¬ÀÖ³ÉʹÓôËÎó²îµÄ¹¥»÷Õß¿ÉÒÔÔÚÄ¿½ñÓû§µÄÉÏÏÂÎÄÖÐÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁËWindows Server 2008ÖеÄIE9£¬£¬Windows Server 2012ÖеÄIE10ÒÔ¼°¶à¸öWindows°æ±¾ÖеÄIE 11¡£¡£¡£¡£¡£ÓÉÓÚ´ËÎó²îÒÑÔÚÒ°Íâ±»Æð¾¢Ê¹Ó㬣¬½¨ÒéÓû§¾¡¿ì×°ÖøüС£¡£¡£¡£¡£

 

 Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2018/12/internet-explorer-zero-day.html


ÉùÃ÷£º±¾×ÊѶÓÉÈËÉú¾ÍÊDz©Î¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí